Optimal Design of Practical Quantum Key Distribution Backbones for Securing CoreTransport Networks

We describe two mixed-integer linear programming formulations, one a faster version of a previous proposal, the other a slower but better performing new model, for the design of Quantum Key Distribution (QKD) sub-networks dimensioned to secure existing core fiber plants. We exploit existing technologies, including non-quantum repeater nodes and multiple disjoint QKD paths to overcome reach limitations while maintaining security guarantees. We examine the models’ performance using simulations on both synthetic and real topologies, quantifying their time and resulting QKD network cost compared to our previous proposal.

[1]  Siddhartha Santra,et al.  Quantum repeaters based on two species trapped ions , 2018, 2018 IEEE Photonics Society Summer Topical Meeting Series (SUM).

[2]  Peter Schartner,et al.  Quantum Key Management , 2012 .

[3]  Jan Bouda,et al.  Using quantum key distribution for cryptographic purposes: A survey , 2007, Theor. Comput. Sci..

[4]  G. Dantzig,et al.  Notes on Linear Programming: Part 1. The Generalized Simplex Method for Minimizing a Linear Form under Linear Inequality Restraints , 1954 .

[5]  Richard V. Penty,et al.  Quantum-Safe Metro Network With Low-Latency Reconfigurable Quantum Key Distribution , 2018, Journal of Lightwave Technology.

[6]  Yongmei Huang,et al.  Satellite-to-ground quantum key distribution , 2017, Nature.

[7]  Umesh V. Vazirani,et al.  Fully device independent quantum key distribution , 2012, Commun. ACM.

[8]  A. Land,et al.  An Automatic Method for Solving Discrete Programming Problems , 1960, 50 Years of Integer Programming.

[9]  L Velasco,et al.  Experimental demonstration of centralized and distributed impairment-aware control plane schemes for dynamic transparent optical networks , 2010, 2010 Conference on Optical Fiber Communication (OFC/NFOEC), collocated National Fiber Optic Engineers Conference.

[10]  F. Rambach,et al.  A multilayer cost model for metro/core networks , 2013, IEEE/OSA Journal of Optical Communications and Networking.

[11]  David Elkouss,et al.  Secure optical networks based on quantum key distribution and weakly trusted repeaters , 2013, IEEE/OSA Journal of Optical Communications and Networking.

[12]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[13]  E. Diamanti,et al.  Topological optimization of quantum key distribution networks , 2009, 0903.0839.